EP2584539B1 - Method for configuring an electromechanical lock - Google Patents
Method for configuring an electromechanical lock Download PDFInfo
- Publication number
- EP2584539B1 EP2584539B1 EP12188900.0A EP12188900A EP2584539B1 EP 2584539 B1 EP2584539 B1 EP 2584539B1 EP 12188900 A EP12188900 A EP 12188900A EP 2584539 B1 EP2584539 B1 EP 2584539B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- communication protocol
- parameter
- lock
- transmitted
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/10—Comprising means for protocol conversion, i.e. format conversion
Definitions
- the invention relates to a method for setting up an electromechanical lock.
- Electromechanical locks exchange data with corresponding keys, either in the lock and / or in the key, the exchanged data are processed to verify authorization of the key. Depending on the result of the check, the lock releases a permission, e.g. access to a place secured by the lock, or the possibility of locking a door.
- Electromechanical locks are often realized as so-called wireless locks. These radio locks communicate via a radio link with so-called radio keys and thus enable a non-contact authorization check.
- the radio key can be a passive transponder, for example, which is held in front of a radio lock and then read out by it.
- the distance between the radio key and the radio lock is usually only a few cm (about 0 - 50cm).
- the radio key may have an active transmitter, which sends a signal after actuation of a button, which is received and evaluated by all radio locks in the transmission range of usually a few meters (about 0.5m - 50m). This type is called an active radio key.
- This system has the advantage that the radio key can be actuated and the radio lock released when approaching the radio lock.
- the gateway control unit can receive data from a server via a radio data link and is connected via at least one vehicle bus to a plurality of control devices of the vehicle in order to apply new program codes to the control units via software download or remote flashing.
- the gateway controller can be freely configured for this. Shortened formulated, the gateway control unit is configured via a radio data link so that the gateway control unit then serves as a programming device for a control unit.
- DE 197 01 740 A1 describes a "Keyless Go" locking system for a motor vehicle.
- the locking system has a key in which a first relatively long code is stored, which is queried by the immobilizer and this switches if necessary free.
- this key has a second shorter code that is correspondingly fast to transfer and is requested to unlock the door.
- the codes are transmitted encrypted as usual. The selection of a corresponding code is made by the respective "lock” and either by a precommand or by the length of a random number transmitted by the lock, which is encrypted by means of the corresponding code and then transmitted back to the lock.
- DE 101 38 217 A1 proposes, in a communication between a transponder and a base station, the header of the data packets information about the data transmitted in the middle section of the data packets, eg their identifier to specify.
- WO 2010/039598 A2 It is believed that prior art electronic locks communicate with each other over a common network and then be configured over that network. Alternatively, the access control devices can be individually configured directly. These two ways of configuring locks are considered either too hardware-intensive or error-prone. Therefore, it is proposed to visit each lock individually and to bring by a smart card in a learning mode. In the learning mode, the lock communicates with a PDA via a wireless data link. By means of the PDA, the lock is integrated into a closed position and taught accordingly.
- EP 1 8035 436 A1 suggests a transponder reader that can handle different protocols to communicate with different transponders. When programming a transponder in a programming mode, these protocols are tried out in order. If a transponder reacts to a specific protocol, then the transponder type and a transponder identification are queried. This is then stored in the transponder reader.
- WO 00 55 796 describes very abstractly a communication method between a reference system and a reader.
- the reference system transmits information to the reading system to optimize the transmission speed.
- US 7,075,412 B1 is based on the observation that the protocols for the communication of RFID tags with the corresponding readers are constantly evolving. This requires a regular replacement of the readers. To avoid this, the software is probably adapted as a firmware update to the new RFID tags.
- WO 2008/144804 discloses an access control device configured by means of a "Commisioning" card. In this configuration, a device ID and encryption key are transferred from the smart card to the device.
- the invention is based on the observation that there are a large number of providers of electromechanical locking systems whose components are not interchangeable or combinable with each other, although they use identically designed remote control keys, which are e.g. come from a common supplier or are standardized. If one has opted for a locking system of a first provider, the locking system type is set and you can not later integrate a lock from another provider in the then existing locking system, i. usually do not share with the already existing keys of the first provider and / or lock and / or add them to existing lock groups.
- the invention has for its object to provide a method with which electromechanical locks of different manufacturers can be integrated into a locking system.
- the invention is based on the recognition that a lock of a first manufacturer could theoretically communicate with keys of a locking system from another manufacturer, but that this fails in practice because the manufacturers use different communication protocols. These communication protocols are previously coded in the respective firmware locks and thus after delivery no longer or only with large Effort changeable.
- the invention is based on the recognition that the communication protocols used can be parameterized between a lock and a key. Therefore, it is sufficient for a lock to transmit the information about the parameters of the communication protocol used within a particular type of locking system so that it can henceforth communicate with these parameters and thus with other components of the corresponding locking system type. A complicated firmware update can therefore be omitted if a lock is to "learn" the communication protocol used in a locking system type.
- the method of setting up an electromechanical lock has at least two steps; namely, as a first step, transmitting at least one parameter from a first data carrier to the lock after a first communication protocol, and as a later step determining at least one second communication protocol from the parameter transmitted after the first communication protocol.
- a lock can be adapted, as it were learned, by transmitting information necessary for communication between components of a specific locking system type to this specific locking system.
- Typical components of a locking system are usually programmable keys and locks and usually also programming devices. It is therefore sufficient to provide a first communication protocol by means of which the parameters of at least one locking system type, that is to say the parameters of a second communication protocol, can be transmitted to the lock and / or at least one key.
- the lock After the transmission of the parameters of the second communication protocol, the lock can be adapted to a specific locking system type, this can be triggered, for example, by the transmission. Subsequently, the lock can be integrated, for example, in an existing locking system of this type of locking system. The installation of a manufacturer-dependent firmware is not necessary to adapt to the locking system type.
- the transmitted parameters ensure that the data transmitted according to the second communication protocol can be correctly interpreted by the lock.
- information about the second communication protocol is transmitted in a metalanguage, namely the first communication protocol to the lock, which then determines an object language, namely the second communication protocol, from the information transmitted in the metalanguage.
- the object language may include communication patterns, eg, the length and structure of frames exchanged according to the second communication protocol, the data rate of the second communication protocol, as well as information about data formats for information to be transmitted according to the second communication protocol, eg date and / or time information or to be used encryption algorithms.
- a metalanguage in which the second communication protocol can be defined can be, for example, XML or a similar language.
- the metalanguage can also be used to determine a physical interface, more generally a port of the second communication protocol, for example a specific transmission and / or reception frequency, an antenna or a connection.
- a communication according to the first communication protocol is handled via the same physical interface or the same port as the communication according to the second communication protocol.
- the first communication protocol preferably uses as well as passive RFID transponders the attenuation of an electromagnetic field emitted by the lock to the at least one parameter after the first Transfer communication protocol.
- the at least one parameter can be stored, for example, in an RFID transponder and transmitted after the first communication protocol.
- the second communication protocol may provide for transmission by attenuation of an electromagnetic field emitted by the lock, but the first communication protocol may be transmission by means of a frequency modulated electromagnetic wave or by means of a cable connection.
- the method can be used for all communicating components of a locking system, i. not only used for locks. So it is strictly speaking a method for setting up a component of an electromechanical locking system. Only for the sake of clarity, the invention will be explained using the example of a castle.
- the component ie the lock, generates the second communication protocol after transmission of the parameters. it has all the information to exchange data with other components of the locking system type determined by the second communication protocol. Exchanging data may be, for example, performing an authorization query. The result may also be that a key (as a synonym for another component) does not have the necessary authorization.
- information about the authorization of keys of a particular locking system is transmitted to the lock according to the second communication protocol.
- tools tools
- a lock would be made with firmware containing the first communication protocol.
- the lock could then be delivered to a middleman.
- the intermediate trailer can then transmit the parameters by means of the first communication protocol on the basis of which the lock determines the second communication protocol.
- the lock can be integrated into a locking system, for example by transmitting information about authorized keys according to the second communication protocol.
- the authorization check is performed such that a secure, i. encrypted data link between the communication partners is established.
- so-called crypto-keys are used, which are values to be kept secret, by means of which the data to be transmitted is encrypted and / or decrypted. If the crypto-keys of two communication partners do not match, no secure data link can be established; Nevertheless, the communication partners communicate with each other, because they are able to exchange the data necessary for setting up the secure data link through the second communication protocol. This exchange is also initiated correctly, but the authorization check is aborted because the check of the crypto-keys reveals that they do not match.
- the cryptokey is not included in most locking systems to the parameters of the locking system type, but most of the encryption algorithm. However, the encryption algorithm can also be specified by a standard and is then preferably stored in the hardware or firmware.
- the parameters of the second communication protocol are usually not the information associated with a particular object or building (hereinafter "object-specific information”), such as the lock facility number or membership of a component to a particular lock group, but the information necessary to be object specific To read and / or write information, if authorized.
- object-specific information such as the lock facility number or membership of a component to a particular lock group
- the term parameter in one embodiment of the invention does not necessarily designate the commands available for the communication, it preferably designates at least the information necessary for the assignment of transmitted data to given variables. This is particularly important if, according to a communication protocol, the values of several variables are exchanged one after another as a bit sequence.
- parameter is meant any information transmitted from the volume to the lock after the first communication protocol to determine the second communication protocol.
- data is all that is transmitted according to the second communication protocol.
- Each type of memory can be used as a data carrier, from which the at least one parameter of the second communication protocol is transmitted to the lock by means of the first communication protocol.
- Typical memories are magnetic memories, semiconductor memories and optical memories.
- the lock communicates by means of the second communication protocol with at least one key.
- the lock can therefore communicate with appropriate parameters with keys of any locking system type and thus be integrated into this lock system type.
- At least the size of the vector spaces of the doors and / or the keys and / or the locking groups is transmitted as at least one parameter.
- These sizes are often essential to the memory management of the castle and / or the key and for the bit length of the corresponding variables and fields, because in many locking systems in the authorization check the information is exchanged in which locks and / or locking groups of the respective key is authorized.
- All doors, locking groups and keys of a locking system form the basis for the respective binary vector space T, G or S.
- the dimensions of the respective vector spaces T, G, S limit the maximum number of locks, locking groups or locking mechanisms that can be integrated in a locking system of the given locking system type Key.
- the dimension of the corresponding vector space is information about the storage space required for representing the vectors, which is relevant when extracting such vectors from a bit sequence.
- m is the dimension of the vector space and thus indicates the maximum number of manageable locking groups in the given locking system type.
- ⁇ and / or p and the other component, respectively, and m may be a relevant parameter to represent a vector ⁇ evaluate containing bit sequence.
- the representation of binary vectors such as the binary vectors of the vector spaces T, G, S may be parameters of the second communication protocol.
- a header is preferably transmitted which identifies the following information of the transmission as a parameter of the second communication protocol. This can do that Lock based on the header distinguish whether it communicates with a key or whether it is adapted to a locking system type.
- parameters of the second communication protocol are transmitted in blocks, wherein a specific block section identifies the parameter and at least one further block section identifies the value of the parameter.
- the block preferably contains an indication of its size. This increases the flexibility of the first communication protocol, and makes it possible to omit unnecessary parameters.
- a preferred parameter of a second communication protocol is, e.g. the type of encryption of the lock-to-key communication, or the way in which authorizations are time-limited.
- Another preferred parameter is the way of retrieving data from the lock or key.
- the second communication protocol allow immediate read and / or write access to specific memory areas of the respective communication partner.
- the jump addresses (pointers) to the corresponding memory locations are preferably parameters of the second communication protocol.
- the information can be transmitted on how a bit sequence transmitted according to the second communication protocol is to be interpreted.
- the values of the individual variables for checking the authorization such as a locking group number, a door number, etc.
- the information about the positions of the values of Variables in the bit sequence are preferably transmitted after the first communication protocol.
- At least one parameter in the lock has a standard value (default value) which can be replaced by another value when transmitting the information.
- default value the amount of information to be transmitted can be reduced and there can be a "default protocol”. It is then sufficient to transmit the deviations of the second communication protocol to the lock.
- At least one piece of information is transmitted which represents the data format of the data stored or to be stored on the key and / or the lock.
- data can be stored in compressed form and / or transferred.
- the information would be if and if so which compression method application is a preferably transmitted parameter of the second communication protocol.
- At least one piece of information is transmitted, which stands for at least one memory address in at least one key, from which data is read to check the authorization of the key.
- an entry address for reading a crypto-key can be transmitted.
- At least one parameter is transmitted, by means of which an encryption method for protecting data transmitted according to the second communication protocol is selected. Then the lock can be used in locking systems with various encryption methods.
- the information about a particular locking system type can be transmitted to the lock as a parameter.
- the lock for at least one locking system type a corresponding parameter set stored.
- the transmission of only one locking system type can be done much faster than the transmission of a whole parameter set. As a result, the time to learn the lock can be significantly shortened.
- the information is preferably transmitted via the same interface from the data carrier, via which the communication with the keys is also carried out later.
- the communication with the first RFID transponder via the first communication protocol and the communication with the other RFID transponders according to the second communication protocol.
- a lock can be involved simultaneously in two or more locking systems of different types. For example, it may then first attempt communication with a key after a first second communication protocol, and if this fails, begin communication for at least one further second communication protocol.
- the program code of the firmware is transmitted by means of the at least one parameter transmitted after the first communication protocol, the information for determining the subsequently to be used second communication protocol.
- the firmware is usually located in a program memory.
- the at least one parameter is preferably not loaded into the program memory but into a data memory.
- a preferred permanent flag is set which prevents a change of the second communication protocol. This increases the security against manipulation of the lock.
- an electromechanical locking system such as an electromechanical lock 10 with a disk 20 for a given, ie the lock 10 and the disk 20 known first communication protocol.
- the data carrier 20 may be, for example, the RFID transponder card shown.
- the lock 10 is shown here by way of example as a knob cylinder.
- an encrypted data link 30 is first established between the lock 10 and the data carrier 20, and then a header 31 is transmitted from the data carrier 10 to the lock 20. Based on the header 31 detects the lock whether or not subsequently parameter 33 of a second communication protocol associated with a particular lock type is transmitted. If, as indicated, parameter 33 is to be transmitted, it goes into a "learning mode", which is indicated by an arrow 32.
- a second communication protocol is parameterized on the basis of the transmitted parameters 33.
- the lock can be inserted into a concrete locking system, for example, in which he tells him a lock ID 34, and / or a group ID 35 and / or encryption parameters 36 of the specific locking system. This can then be done using the second communication protocol, for example by means of a separate data carrier 22, a configuration unit (not shown) or a control center of the locking system (not shown).
- the lock 10 now has all the information it needs to check the authorization 37 of a key 24 of the locking systems.
- a file with a predetermined file name containing the at least one parameter can be stored on a data medium.
- the lock asks the disk if it has a file with the specific name. If so, it goes into the learning mode, the reads the at least one parameter from the data medium, for example from the file, and determines the second communication protocol based on the at least one parameter.
- a flag eg a bit, is set which prevents the learning mode from being called again.
- the lock preferably polls the flag, and only checks if it should go into the learning mode or not, if the flag is not set.
- the flag may be checked at any time prior to the configuration of the second communication protocol. The purpose of the query of the flag is to prevent a once defined second communication protocol is replaced by a new second communication protocol to prevent tampering.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Description
Die Erfindung betrifft ein Verfahren zum Einrichten eines elektromechanischen Schlosses.The invention relates to a method for setting up an electromechanical lock.
Elektromechanische Schlösser tauschen Daten mit entsprechenden Schlüsseln aus, wobei entweder im Schloss und/oder im Schlüssel die ausgetauschten Daten verarbeitet werden, um eine Berechtigung des Schlüssels zu überprüfen. Je nach Ergebnis der Prüfung gibt das Schloss eine Berechtigung frei, z.B. den Zugang zu einem durch das Schloss gesicherten Ort, oder die Möglichkeit eine Tür zu verriegeln.Electromechanical locks exchange data with corresponding keys, either in the lock and / or in the key, the exchanged data are processed to verify authorization of the key. Depending on the result of the check, the lock releases a permission, e.g. access to a place secured by the lock, or the possibility of locking a door.
Elektromechanische Schlösser sind oft als sogenannte Funkschlösser realisiert. Diese Funkschlösser kommunizieren über eine Funkverbindung mit sogenannten Funkschlüsseln und ermöglichen so eine berührungslose Berechtigungsprüfung. Der Funkschlüssel kann z.B. ein passiver Transponder sein, der vor ein Funkschloss gehalten und dann von diesem ausgelesen wird. Dabei beträgt der Abstand zwischen dem Funkschlüssel und dem Funkschloss in der Regel nur wenige cm (ca. 0 - 50cm). Alternativ kann der Funkschlüssel einen aktiven Sender haben, der nach Betätigung eines Tasters ein Signal sendet, welches von allen Funkschlössern im Sendebereich von üblicherweise einigen Metern (etwa 0,5m - 50m) empfangen und ausgewertet wird. Dieser Typ wird als aktiver Funkschlüssel bezeichnet. Dieses System hat den Vorteil, dass schon bei einer Annäherung an das Funkschloss der Funkschlüssel betätigt und das Funkschloss freigegeben werden kann.Electromechanical locks are often realized as so-called wireless locks. These radio locks communicate via a radio link with so-called radio keys and thus enable a non-contact authorization check. The radio key can be a passive transponder, for example, which is held in front of a radio lock and then read out by it. The distance between the radio key and the radio lock is usually only a few cm (about 0 - 50cm). Alternatively, the radio key may have an active transmitter, which sends a signal after actuation of a button, which is received and evaluated by all radio locks in the transmission range of usually a few meters (about 0.5m - 50m). This type is called an active radio key. This system has the advantage that the radio key can be actuated and the radio lock released when approaching the radio lock.
Zur Überprüfung der Berechtigung von elektrischen Schlüsseln, wie z.B. Funkschlüsseln gibt es eine Vielzahl von Verfahren, beispielsweise beschreiben die Offenlegungsschriften
Der Erfindung liegt die Beobachtung zugrunde, dass es eine Vielzahl von Anbietern elektromechanischer Schließsysteme gibt, deren Komponenten nicht gegeneinander austauschbar oder miteinander kombinierbar sind, obgleich sie baugleiche Funkschlüssel einsetzen, die z.B. von einem gemeinsamen Lieferanten stammen oder standardisiert sind. Hat man sich für ein Schließsystem eines ersten Anbieters entschieden, ist der Schließanlagentyp festgelegt und kann man später ein Schloss eines anderen Anbieters nicht in die dann bestehende Schließanlage integrieren, d.h. in der Regel nicht mit den schon vorhandenen Schlüsseln des ersten Anbieters freigeben und/oder sperren und/oder sie zu bestehenden Schließgruppen hinzufügen.The invention is based on the observation that there are a large number of providers of electromechanical locking systems whose components are not interchangeable or combinable with each other, although they use identically designed remote control keys, which are e.g. come from a common supplier or are standardized. If one has opted for a locking system of a first provider, the locking system type is set and you can not later integrate a lock from another provider in the then existing locking system, i. usually do not share with the already existing keys of the first provider and / or lock and / or add them to existing lock groups.
Der Erfindung liegt die Aufgabe zugrunde, ein Verfahren anzubieten, mit dem elektromechanische Schlösser verschiedener Hersteller in ein Schließsystem integriert werden können.The invention has for its object to provide a method with which electromechanical locks of different manufacturers can be integrated into a locking system.
Diese Aufgabe wird durch ein Verfahren nach Anspruch 1 gelöst. Vorteilhafte Ausgestaltungen der Erfindung sind in den Unteransprüchen angegeben.This object is achieved by a method according to claim 1. Advantageous embodiments of the invention are specified in the subclaims.
Die Erfindung beruht zum einen auf der Erkenntnis, dass ein Schloss eines ersten Herstellers theoretisch zwar mit Schlüsseln eines Schließsystems eines anderen Herstellers kommunizieren könnte, dass dies jedoch in der Praxis fehlschlägt, weil die Hersteller unterschiedliche Kommunikationsprotokolle verwenden. Diese Kommunikationsprotokolle sind bisher in der jeweiligen Firmware der Schlösser kodiert und somit nach der Auslieferung nicht mehr oder nur mit großem Aufwand veränderbar. Zum anderen beruht die Erfindung auf der Erkenntnis, dass die verwendeten Kommunikationsprotokolle zwischen einem Schloss und einen Schlüssel parametrisierbar sind. Deshalb genügt, es einem Schloss die Informationen über die Parameter des innerhalb eines bestimmten Schließsystemtyps verwendeten Kommunikationsprotokolls zu übertragen, so dass es fortan mit diesen Parametern und somit mit anderen Komponenten des entsprechenden Schließsystemtyps kommunizieren kann. Ein kompliziertes Firmwareupdate kann daher entfallen, wenn ein Schloss das in einem Schließanlagentyp verwendete Kommunikationsprotokoll "erlernen" soll.The invention is based on the recognition that a lock of a first manufacturer could theoretically communicate with keys of a locking system from another manufacturer, but that this fails in practice because the manufacturers use different communication protocols. These communication protocols are previously coded in the respective firmware locks and thus after delivery no longer or only with large Effort changeable. On the other hand, the invention is based on the recognition that the communication protocols used can be parameterized between a lock and a key. Therefore, it is sufficient for a lock to transmit the information about the parameters of the communication protocol used within a particular type of locking system so that it can henceforth communicate with these parameters and thus with other components of the corresponding locking system type. A complicated firmware update can therefore be omitted if a lock is to "learn" the communication protocol used in a locking system type.
Das Verfahren zum Einrichten eines elektromechanischen Schlosses, hat zumindest zwei Schritte; nämlich als ersten Schritt das Übertragen von wenigsten einem Parameter von einem ersten Datenträger an das Schloss nach einem ersten Kommunikationsprotokoll, und als späteren Schritt das Bestimmen von mindestens einem zweiten Kommunikationsprotokoll anhand der bzw. des nach dem ersten Kommunikationsprotokoll übertragenen Parameter bzw. Parameters. Nach dem Verfahren kann ein Schloss durch Übermittlung von zur Kommunikation zwischen Komponenten eines bestimmten Schließanlagentyps notwendigen Informationen an diese bestimmte Schließanlage angepasst, sozusagen angelernt, werden. Typische Komponenten einer Schließanlage sind meist programmierbare Schlüssel und Schlösser und meist auch Programmiergeräte. Es genügt also ein erstes Kommunikationsprotokoll vorzusehen, mittels dessen die Parameter zumindest eines Schließanlagentyps, also die Parameter eines zweiten Kommunikationsprotokolls auf das Schloss und/oder wenigstens einen Schlüssel übertragbar sind. Nach der Übertragung der Parameter des zweiten Kommunikationsprotokolls kann das Schlöss an einen bestimmten Schließanlagentyp zangepasst werden, dies kann beispielsweise durch die Übertragung ausgelöst werden. Anschließend kann das Schloss z.B. in eine bestehende Schließanlage dieses Schließanlagentyps integriert werden. Das Aufspielen einer herstellerabhängigen Firmware ist zur Anpassung an den Schließanlagentyp nicht notwendig. Erst durch die übertragenen Parameter wird sichergestellt, dass die nach dem zweiten Kommunikationsprotokoll übermittelten Daten von dem Schloss richtig interpretiert werden können. Anders formuliert werden Informationen über das zweite Kommunikationsprotokoll in einer Metasprache, nämlich dem ersten Kommunikationsprotokoll an das Schloss übertragen, das dann aus den in der Metasprache übermittelten Informationen eine Objektsprache, nämlich das zweite Kommunikationsprotokoll ermittelt. Die Objektsprache kann Kommunikationsmuster enthalten, z.B. die Länge und der Aufbau von Frames die nach dem zweiten Kommunikationsprotokoll ausgetauscht werden, die Datenrate des zweiten Kommunikationsprotokoll als auch Informationen über Datenformate für nach dem zweiten Kommunikationsprotokoll zu übertragende Informationen, z.B. Datums und/oder Zeitangaben oder zu verwendende Verschlüsselungsalgorithmen. Eine Metasprache in der sich das zweite Kommunikationsprotokoll definieren lässt, kann z.B. XML oder eine ähnliche Sprache sein. Über die Metasprache kann auch eine physikalische Schnittstelle, allgemeiner ein Port des zweiten Kommunikationsprotokolls bestimmt werden, z.B. eine bestimmte Sende- und/oder Empfangsfrequenz, eine Antenne oder ein Anschluss.The method of setting up an electromechanical lock has at least two steps; namely, as a first step, transmitting at least one parameter from a first data carrier to the lock after a first communication protocol, and as a later step determining at least one second communication protocol from the parameter transmitted after the first communication protocol. According to the method, a lock can be adapted, as it were learned, by transmitting information necessary for communication between components of a specific locking system type to this specific locking system. Typical components of a locking system are usually programmable keys and locks and usually also programming devices. It is therefore sufficient to provide a first communication protocol by means of which the parameters of at least one locking system type, that is to say the parameters of a second communication protocol, can be transmitted to the lock and / or at least one key. After the transmission of the parameters of the second communication protocol, the lock can be adapted to a specific locking system type, this can be triggered, for example, by the transmission. Subsequently, the lock can be integrated, for example, in an existing locking system of this type of locking system. The installation of a manufacturer-dependent firmware is not necessary to adapt to the locking system type. First the transmitted parameters ensure that the data transmitted according to the second communication protocol can be correctly interpreted by the lock. In other words, information about the second communication protocol is transmitted in a metalanguage, namely the first communication protocol to the lock, which then determines an object language, namely the second communication protocol, from the information transmitted in the metalanguage. The object language may include communication patterns, eg, the length and structure of frames exchanged according to the second communication protocol, the data rate of the second communication protocol, as well as information about data formats for information to be transmitted according to the second communication protocol, eg date and / or time information or to be used encryption algorithms. A metalanguage in which the second communication protocol can be defined can be, for example, XML or a similar language. The metalanguage can also be used to determine a physical interface, more generally a port of the second communication protocol, for example a specific transmission and / or reception frequency, an antenna or a connection.
Bevorzugt wird eine Kommunikation nach dem ersten Kommunikationsprotokoll über die gleiche physikalische Schnittstelle bzw. den gleichen Port abgewickelt, wie die Kommunikation nach dem zweiten Kommunikationsprotokoll. Dadurch genügt es eine einzige Schnittstelle/Port vorzusehen und die Hardwarekosten können reduziert werden. Wenn beispielsweise das Schloss in Schließanlagen integriert werden soll, bei der die Schlüssel ausschließlich passive RFID-Transponder sind, dann nutzt das erste Kommunikationsprotokoll bevorzugt ebenso wie passive RFID-Transponder die Dämpfung eines vom Schloss emittierten elektromagnetischen Felds, um den wenigstens einen Parameter nach dem ersten Kommunikationsprotokoll zu übertragen. Dazu kann der wenigstens eine Parameter z.B. in einem RFID-Transponder gespeichert sein und nach dem ersten Kommunikationsprotokoll übertragen werden. Alternativ können die Kommunikationsprotokolle natürlich auch unterschiedliche Übertragungskanäle (= Übertragungswege) nutzen. Beispielsweise kann das zweite Kommunikationsprotokoll eine Übertragung durch Dämpfung eines vom Schloss emittierten elektromagnetischen Felds vorsehen, das erste Kommunikationsprotokoll aber die Übertragung mittels einer frequenzmodulieren elektromagnetischen Welle oder mittels einer Kabelverbindung.Preferably, a communication according to the first communication protocol is handled via the same physical interface or the same port as the communication according to the second communication protocol. As a result, it is sufficient to provide a single interface / port and the hardware costs can be reduced. For example, if the lock is to be integrated into locking systems in which the keys are passive RFID transponders only, then the first communication protocol preferably uses as well as passive RFID transponders the attenuation of an electromagnetic field emitted by the lock to the at least one parameter after the first Transfer communication protocol. For this purpose, the at least one parameter can be stored, for example, in an RFID transponder and transmitted after the first communication protocol. Alternatively, the communication protocols Of course, use different transmission channels (= transmission paths). For example, the second communication protocol may provide for transmission by attenuation of an electromagnetic field emitted by the lock, but the first communication protocol may be transmission by means of a frequency modulated electromagnetic wave or by means of a cable connection.
Das Verfahren kann für alle miteinander kommunizierenden Komponenten eines Schließsystems, d.h. nicht nur für Schlösser verwendet werden. Es ist also genau genommen ein Verfahren zum Einrichten einer Komponente eines elektromechanischen Schließsystems. Lediglich der Anschaulichkeit halber wird die Erfindung am Beispiel eines Schlosses erläutert.The method can be used for all communicating components of a locking system, i. not only used for locks. So it is strictly speaking a method for setting up a component of an electromechanical locking system. Only for the sake of clarity, the invention will be explained using the example of a castle.
Die Komponente, also das Schloss, generiert nach der Übertragung der Parameter das zweite Kommunikationsprotokoll, d.h. es hat alle Informationen, um mit anderen Komponenten des durch das zweite Kommunikationsprotokoll bestimmten Schließanlagentyps Daten auszutauschen. Das Austauschen von Daten kann beispielsweise das Durchführen einer Berechtigungsabfrage sein. Das Ergebnis kann also auch sein, dass ein Schlüssel (als Synonym für eine andere Komponente) nicht die notwendige Berechtigung aufweist.The component, ie the lock, generates the second communication protocol after transmission of the parameters. it has all the information to exchange data with other components of the locking system type determined by the second communication protocol. Exchanging data may be, for example, performing an authorization query. The result may also be that a key (as a synonym for another component) does not have the necessary authorization.
Bevorzugt werden Informationen über die Berechtigung von Schlüsseln einer bestimmten Schließanlage nach dem zweiten Kommunikationsprotokoll auf das Schloss übertragen. Das ermöglicht es diese Informationen mit den jeweils herstellerspezifischen Werkzeugen ("Tools") zu übertragen. In diesem Fall würde ein Schloss mit einer Firmware gefertigt, die das erste Kommunikationsprotokoll enthält. Das Schloss könnte dann an einen Zwischenhändler ausgeliefert werden. Der Zwischenhänaler Kann dann mittels des ersten Kommunikationsprotokolls die Parameter übermitteln anhand der das Schloss das zweite Kommunikationsprotokolls bestimmt. Dadurch wird das Schloss an einen gegeben Schließanlagentyp angepasst. Im folgenden Schritt kann das Schloss in eine Schließanlage integriert werden, z.B. indem man Informationen über berechtigte Schlüssel nach dem zweiten Kommunikationsprotokoll übermittelt.Preferably, information about the authorization of keys of a particular locking system is transmitted to the lock according to the second communication protocol. This makes it possible to transfer this information with the respective manufacturer-specific tools ("tools"). In this case, a lock would be made with firmware containing the first communication protocol. The lock could then be delivered to a middleman. The intermediate trailer can then transmit the parameters by means of the first communication protocol on the basis of which the lock determines the second communication protocol. This locks the lock to a given type of lock system customized. In the following step, the lock can be integrated into a locking system, for example by transmitting information about authorized keys according to the second communication protocol.
Bei einigen Schließsystemtypen erfolgt die Berechtigungsprüfung derart, dass zunächst eine sichere, d.h. verschlüsselte Datenstrecke zwischen den Kommunikationspartnern aufgebaut wird. Dabei werden sogenannte Kryptokeys verwendet, das sind geheim zuhaltende Werte, anhand der zu übertragende Daten verschlüsselt und/oder entschlüsselt werden. Passen die Kryptokeys zweier Kommunikationspartner nicht zueinander, kann keine sichere Datenstrecke aufgebaut werden; gleichwohl kommunizieren die Kommunikationspartner miteinander, denn sie sind durch das zweite Kommunikationsprotokoll in der Lage den zum Aufbau der sicheren Datenstrecke nötigen Daten auszutauschen. Dieser Austausch wird auch korrekt initiiert, jedoch wird die Berechtigungsprüfung abgebrochen, weil die Prüfung der Kryptokeys ergibt, dass sie nicht zueinander passen. Der Kryptokey gehört bei den meisten Schließanlagen nicht zu den Parametern des Schließanlagentyps, wohl aber meist der Verschlüsselungsalgorithmus. Der Verschlüsselungsalgorithmus jedoch kann auch durch einen Standard vorgegeben sein kann und ist dann bevorzugt in der Hardware oder Firmware hinterlegt.In some types of locking systems, the authorization check is performed such that a secure, i. encrypted data link between the communication partners is established. In this case, so-called crypto-keys are used, which are values to be kept secret, by means of which the data to be transmitted is encrypted and / or decrypted. If the crypto-keys of two communication partners do not match, no secure data link can be established; Nevertheless, the communication partners communicate with each other, because they are able to exchange the data necessary for setting up the secure data link through the second communication protocol. This exchange is also initiated correctly, but the authorization check is aborted because the check of the crypto-keys reveals that they do not match. The cryptokey is not included in most locking systems to the parameters of the locking system type, but most of the encryption algorithm. However, the encryption algorithm can also be specified by a standard and is then preferably stored in the hardware or firmware.
Passen die Kryptokeys zueinander, wird dies meist als "grundsätzliche Berechtigung" bewertet. Bei manchen Schließanlagentypen werden zusätzliche im Schlüssel und/oder Schloss abgelegte Daten miteinander verglichen, z.B. ob der Schlüssel eine Berechtigung für eine bestimmte Tür und/oder Schließgruppe hat, ob die Berechtigung zeitlich beschränkt ist, ob es innerhalb einer Schließgruppe Ausnahmen gibt etc.. Diese zusätzlichen Informationen werden vor der Freigabe des entsprechenden Schlosses meist mit ausgewertet.If the crypto-keys match each other, this is usually rated as "basic authorization". For some types of locking equipment, additional data stored in the key and / or lock is compared with each other, eg if the key has authorization for a particular door and / or lock group, if the authorization is temporary, if there are exceptions within a lock group etc. Additional information is usually evaluated before the release of the corresponding lock.
Die Parameter des zweiten Kommunikationsprotokolls sind in der Regel nicht die zu einem bestimmten Objekt oder Gebäude gehörenden Informationen (nachfolgend "objektspezifische Informationen"), wie die Schließanlagennummer oder die Zugehörigkeit einer Komponente zu einer bestimmten Schließgruppe, sondern die Informationen, die notwendig sind, um objektspezifische Informationen lesen und/oder schreiben zu können, sofern die Berechtigung dafür vorliegt. Der Begriff Parameter bezeichnet in einer Ausführungsform der Erfindung nicht notwendigerweise die für die Kommunikation zur Verfügung stehenden Befehle, bevorzugt bezeichnet er zumindest die für die Zuordnung von übertragenen Daten zu gegebenen Variablen notwendigen Informationen. Das ist insbesondere dann wichtig, wenn nach einem Kommunikationsprotokoll die Werte mehrerer Variablen nachaneinander als Bitfolge ausgetauscht werden.The parameters of the second communication protocol are usually not the information associated with a particular object or building (hereinafter "object-specific information"), such as the lock facility number or membership of a component to a particular lock group, but the information necessary to be object specific To read and / or write information, if authorized. The term parameter in one embodiment of the invention does not necessarily designate the commands available for the communication, it preferably designates at least the information necessary for the assignment of transmitted data to given variables. This is particularly important if, according to a communication protocol, the values of several variables are exchanged one after another as a bit sequence.
Als "Parameter" wird jede Information bezeichnet, die von dem Datenträger auf das Schloss nach dem ersten Kommunikationsprotokoll übertragen wird, um das zweite Kommunikationsprotokoll zu bestimmen. Als "Daten" wird hingegen all das bezeichnet, was nach dem zweiten Kommunikationsprotokoll übertragen wird. Jede Art von Speicher kann als Datenträger genutzt werden, aus dem der wenigstens eine Parameter des zweiten Kommunikationsprotokolls mittels dem ersten Kommunikationsprotokoll an das Schloss übertragen wird. Typische Speicher sind Magnetspeicher, Halbleiterspeicher und optische Speicher.As "parameter" is meant any information transmitted from the volume to the lock after the first communication protocol to determine the second communication protocol. By contrast, what is referred to as "data" is all that is transmitted according to the second communication protocol. Each type of memory can be used as a data carrier, from which the at least one parameter of the second communication protocol is transmitted to the lock by means of the first communication protocol. Typical memories are magnetic memories, semiconductor memories and optical memories.
Vorzugsweise kommuniziert das Schloss mittels des zweiten Kommunikationsprotokolls mit mindestens einem Schlüssel. Das Schloss kann also bei entsprechender Parametrierung mit Schlüsseln eines beliebigen Schließanlagentyps kommunizieren und somit in diesen Schließanlagentyp eingebunden werden.Preferably, the lock communicates by means of the second communication protocol with at least one key. The lock can therefore communicate with appropriate parameters with keys of any locking system type and thus be integrated into this lock system type.
Bevorzugt wird zumindest die Größe der Vektorräume der Türen und/oder der Schlüssel und/oder der Schließgruppen als wenigsten ein Parameter übertragen. Diese Größen sind oft wesentlich für die Speicherverwaltung des Schlosses und/oder des Schlüssels sowie für die Bitlänge der entsprechenden Variablen und Felder, weil bei vielen Schließsystemen bei der Berechtigungsprüfung die Information ausgetauscht wird, in welchen Schlössern und/oder Schließgruppen der jeweilige Schlüssel berechtigt ist. Alle Türen, Schließgruppen und Schlüssel einer Schließanlage bilden die Basis für den jeweiligen binären Vektorraum T, G bzw. S. Somit begrenzen die Dimensionen der jeweiligen Vektorräume T, G, S die maximale Anzahl der in einer Schließanlage des gegeben Schließanlagentyps integrierbaren Schlösser, Schließgruppen bzw. Schlüssel. Die Dimension des entsprechenden Vektorraums ist eine Information über den zur Darstellung der Vektoren benötigten Speicherplatzes, die beim extrahieren solcher Vektoren aus einer Bitfolge relevant ist. Beispielsweise lässt sich der Vektorraum G der Gruppen darstellen als
Bevorzugt werden Parameter des zweiten Kommunikationsprotokolls in Blöcken übertragen, wobei ein bestimmter Blockabschnitt den Parameter identifiziert und wenigstens ein weiterer Blockabschnitt den Wert des Parameters. Bevorzugt enthält der Block eine Angabe über seine Größe. Dies erhöht die Flexibilität des ersten Kommunikationsprotokolls, und ermöglicht es nicht benötigte Parameter wegzulassen.Preferably, parameters of the second communication protocol are transmitted in blocks, wherein a specific block section identifies the parameter and at least one further block section identifies the value of the parameter. The block preferably contains an indication of its size. This increases the flexibility of the first communication protocol, and makes it possible to omit unnecessary parameters.
Ein bevorzugter Parameter eines zweiten Kommunikationsprotokolls ist, z.B. die Art der Verschlüsselung der Kommunikation zwischen Schloss und Schlüssel, oder die Art der Darstellung zeitlicher Begrenzungen von Berechtigungen.A preferred parameter of a second communication protocol is, e.g. the type of encryption of the lock-to-key communication, or the way in which authorizations are time-limited.
Ein anderer bevorzugter Parameter ist die Art der Abfrage von Daten aus dem Schloss oder Schlüssel. Beispielsweise kann das zweite Kommunikationsprotokoll einen unmittelbaren Lese und/oder Schreibzugriff auf bestimmte Speicherbereiche des jeweiligen Kommunikationspartners ermöglichen. Dann sind auch die Sprungadressen (Pointer) zu den entsprechenden Speicherstellen vorzugsweise Parameter des zweiten Kommunikationsprotokolls. Insbesondere kann bei der Übertragung der Parameter die Information darüber übertragen werden, wie eine nach dem zweiten Kommunikationsprotokoll übertragene Bitfolge zu interpretieren ist. Einige Schließanlagentypen lesen bei der Überprüfung einer Berechtigung eines Schlüssels Daten aus standardisierten Speicherbereichen des Schlüssels, z.B. eines passiven RFID-Transponders, aus. Diese Daten werden bevorzugt als Bitfolge übertragen, in die Werte von zwei oder mehr Variablen abgelegt sind. Anschließend werden die Werte der einzelnen Variablen zur Prüfung der Berechtigung, wie z.B. eine Schließgruppennummer, eine Türnummer etc., aus der Bitfolge extrahiert. Die Informationen über die Positionen der Werte der Variablen in der Bitfolge, werden bevorzugt nach dem ersten Kommunikationsprotokoll übertragen.Another preferred parameter is the way of retrieving data from the lock or key. For example, the second communication protocol allow immediate read and / or write access to specific memory areas of the respective communication partner. Then also the jump addresses (pointers) to the corresponding memory locations are preferably parameters of the second communication protocol. In particular, in the transmission of the parameters, the information can be transmitted on how a bit sequence transmitted according to the second communication protocol is to be interpreted. Some types of locking equipment, when checking authorization of a key, read data from standardized memory areas of the key, eg a passive RFID transponder. This data is preferably transmitted as a bit sequence in which values of two or more variables are stored. Subsequently, the values of the individual variables for checking the authorization, such as a locking group number, a door number, etc., are extracted from the bit sequence. The information about the positions of the values of Variables in the bit sequence are preferably transmitted after the first communication protocol.
Bevorzugt hat wenigstens ein Parameter in dem Schloss einen Standard-Wert (Default-Wert), der bei der Übertragung der Informationen durch einen anderen Wert ersetzt werden kann. Dadurch kann die zu übertragende Informationsmenge reduziert werden und es kann ein "Default-Protokoll" geben. Es genügt dann die Abweichungen des zweiten Kommunikationsprotokolls an das Schloss zu übertragen.Preferably, at least one parameter in the lock has a standard value (default value) which can be replaced by another value when transmitting the information. As a result, the amount of information to be transmitted can be reduced and there can be a "default protocol". It is then sufficient to transmit the deviations of the second communication protocol to the lock.
Bevorzugt wird mindestens eine Information übertragen, die für das Datenformat der auf dem Schlüssel und/oder dem Schloss gespeicherten oder zu speichernden Daten steht. Beispielsweise können Daten komprimiert gespeichert und oder übertragen werden. Dann wäre auch die Information ob und wenn ja welches Kompressionsverfahren Anwendung findet ein vorzugsweise übertragener Parameter des zweiten Kommunikationsprotokolls.Preferably, at least one piece of information is transmitted which represents the data format of the data stored or to be stored on the key and / or the lock. For example, data can be stored in compressed form and / or transferred. Then also the information would be if and if so which compression method application is a preferably transmitted parameter of the second communication protocol.
Bevorzugt wird mindestens eine Information übertragen, die für mindestens eine Speicheradresse in mindestens einem Schlüssel steht, aus der zur Prüfung der Berechtigung des Schlüssels Daten gelesen werden. Beispielsweise kann eine Einstiegsadresse zum Auslesen eines Kryptokeys übertragen werden.Preferably, at least one piece of information is transmitted, which stands for at least one memory address in at least one key, from which data is read to check the authorization of the key. For example, an entry address for reading a crypto-key can be transmitted.
Bevorzugt wird mindestens ein Parameter übertragen, anhand dessen ein Verschlüsselungsverfahren zum Schutz von nach dem zweiten Kommunikationsprotokoll übertragenen Daten ausgewählt wird. Dann kann das Schloss in Schließsystemen mit verschiedenen Verschlüsselungsverfahren eingesetzt werden.Preferably, at least one parameter is transmitted, by means of which an encryption method for protecting data transmitted according to the second communication protocol is selected. Then the lock can be used in locking systems with various encryption methods.
Ebenso kann die Information über einen bestimmen Schließanlagentyp an das Schloss als Parameter übertragen werden. In diesem Fall ist auf dem Schloss für wenigstens einen Schließanlagentyp ein entsprechender Parametersatz hinterlegt. Die Übertragung nur eines Schließanlagentyps kann wesentlich schneller erfolgen als die Übertragung eines ganzen Parametersatzes. Dadurch kann die Zeit zum Anlernen des Schlosses erheblich verkürzt werden.Likewise, the information about a particular locking system type can be transmitted to the lock as a parameter. In this case is on the lock for at least one locking system type a corresponding parameter set stored. The transmission of only one locking system type can be done much faster than the transmission of a whole parameter set. As a result, the time to learn the lock can be significantly shortened.
Bevorzugt werden die Informationen über die gleiche Schnittstelle von dem Datenträger übertragen, über den später auch die Kommunikation mit den Schlüsseln erfolgt. Dadurch werden zusätzliche Schnittstellen und somit Kosten vermieden. Beispielsweise kann es genügen einen ersten RFID-Transponder mit den Parametern vor ein Schloss zu halten, so dass der erste RFID-Transponder und dass Schloss kommunizieren können, um so die Parameter für die spätere Kommunikation mit den Schlüsseln, die ebenfalls RFID-Transponder sind zu übergeben. Dann erfolgt die Kommunikation mit dem ersten RFID-Transponder über das erste Kommunikationsprotokoll und die Kommunikation mit den weiteren RFID-Transpondern nach dem zweiten Kommunikationsprotokoll.The information is preferably transmitted via the same interface from the data carrier, via which the communication with the keys is also carried out later. This avoids additional interfaces and thus costs. For example, it may be sufficient to hold a first RFID transponder with the parameters in front of a lock, so that the first RFID transponder and the lock can communicate so as to provide the parameters for later communication with the keys, which are also RFID transponders to hand over. Then, the communication with the first RFID transponder via the first communication protocol and the communication with the other RFID transponders according to the second communication protocol.
Bevorzugt werden bei der Übertragung Informationen zu mindestens zwei Kommunikationsprotokollen übergeben. Dann kann ein Schloss gleichzeitig in zwei oder mehr Schließanlagen unterschiedlichen Typs eingebunden sein. Es kann dann beispielsweise zunächst eine Kommunikation nach einem ersten zweiten Kommunikationsprotokoll mit einem Schlüssel versuchen und wenn diese fehlschlägt eine Kommunikation nach mindestens einem weiteren zweiten Kommunikationsprotokoll beginnen.During transmission, information about at least two communication protocols is preferably transferred. Then a lock can be involved simultaneously in two or more locking systems of different types. For example, it may then first attempt communication with a key after a first second communication protocol, and if this fails, begin communication for at least one further second communication protocol.
Die Erfindung wurde anhand eines in eine Schließanlage einzupassenden Schlosses beschrieben. Jedoch sind elektronische Schlösser und Schlüssel - abgesehen von ihren mechanischen Komponenten-grundsätzlich gegeneinander austauschbar. Deshalb kann auf die gleiche Weise auch ein Schlüssel an einen gegebenen Schließanlagentyp angepasst werden. Gleiches gilt für jede andere Komponente einer Schließanlage, die mit einem Schlüssel oder einem Schloss kommuniziert.The invention has been described with reference to a lock to be fitted in a locking system. However, electronic locks and keys - apart from their mechanical components - are basically interchangeable. Therefore, in the same way a key can be adapted to a given type of locking system. The same applies to every other component a locking system that communicates with a key or a lock.
Nach der Erfindung wird keine neue Firmware auf das Schloss aufgespielt. Dem Programmcode der Firmware werden lediglich mittels dem nach dem ersten Kommunikationsprotokoll wenigstens einen übertragenen Parameter die Informationen zur Bestimmung des anschließend zu verwendenden zweiten Kommunikationsprotokolls übermittelt. Die Firmware befindet sich üblicherweise in einem Programmspeicher. Der wenigstens eine Parameter wird vorzugsweise nicht in den Programmspeicher, sondern in einen Datenspeicher geladen.After the invention, no new firmware is loaded on the lock. The program code of the firmware is transmitted by means of the at least one parameter transmitted after the first communication protocol, the information for determining the subsequently to be used second communication protocol. The firmware is usually located in a program memory. The at least one parameter is preferably not loaded into the program memory but into a data memory.
Nachdem das zweite Kommunikationsprotokoll bestimmt wurde wird ein bevorzugt dauerhaftes Flag gesetzt, das eine Änderung des zweiten Kommunikationsprotokolls verhindert. Dadurch wird die Manipulationssicherheit des Schlosses erhöht.After the second communication protocol has been determined, a preferred permanent flag is set which prevents a change of the second communication protocol. This increases the security against manipulation of the lock.
Die Erfindung wird nachstehend anhand von Ausführungsbeispielen unter Bezugnahme auf die einzige Zeichnung exemplarisch beschrieben.The invention will now be described by way of example with reference to exemplary embodiments with reference to the single drawing.
Bei dem Verfahren in
Auch andere Möglichkeiten den Lernmodus zu initiieren sind möglich. Beispielsweise kann auf einem Datenträger eine Datei mit einem vorbestimmen Dateinamen abgelegt sein, der den wenigstens einen Parameter enthält. Das Schloss fragt den Datenträger ab, ob er eine Datei mit dem bestimmten Namen aufweist. Sofern ja, geht es in den Lernmodus, d.h.es liest den wenigstens einen Parameter aus dem Datenträger aus, beispielsweise aus der Datei, und bestimmt anhand des wenigstens einen Parameters das zweite Kommunikationsprotokoll. Bevorzugt wird anschließend ein Flag, z.B. ein Bit, gesetzt, dass ein erneutes Aufrufen des Lernmodus verhindert. Dazu fragt das Schloss vorzugsweise den Flag ab, und prüft nur dann, ob es in den Lernmodus gehen soll oder nicht, wenn das Flag nicht gesetzt ist. Das Flag kann zu jedem Zeitpunkt vor der Konfiguration des zweiten Kommunikationsprotokolls geprüft werden. Sinn der Abfrage des Flags ist es zu verhindern, dass ein einmal bestimmtes zweites Kommunikationsprotokoll durch ein neues zweites Kommunikationsprotokoll ersetzt wird um dadurch Manipulationen zu verhindern.Other possibilities to initiate the learning mode are possible. For example, a file with a predetermined file name containing the at least one parameter can be stored on a data medium. The lock asks the disk if it has a file with the specific name. If so, it goes into the learning mode, the reads the at least one parameter from the data medium, for example from the file, and determines the second communication protocol based on the at least one parameter. Preferably, subsequently, a flag, eg a bit, is set which prevents the learning mode from being called again. For this, the lock preferably polls the flag, and only checks if it should go into the learning mode or not, if the flag is not set. The flag may be checked at any time prior to the configuration of the second communication protocol. The purpose of the query of the flag is to prevent a once defined second communication protocol is replaced by a new second communication protocol to prevent tampering.
- 1010
- Schlosslock
- 2020
- Datenträger/RFID-KarteDisk / RFID card
- 2424
- Schlüsselkey
- 3030
- verschlüsselte Datenstreckeencrypted data link
- 3131
- Header (Datenkopf)Header
- 3232
- Lernmoduslearning mode
- 3333
- Parameterparameter
- 3434
- Schloss-IDCastle ID
- 3535
- Gruppen-IDGroup ID
- 3636
- Verschlüsselungsparameterencryption parameters
- 3737
- Berechtigungauthorization
Claims (14)
- Method for commissioning a component of an electromechanical locking system, comprising at least the steps of:- transmitting at least one parameter from a first data carrier to the component according to a first communication protocol,- after transmission, based on the parameter/s transmitted according to the first communication protocol, generating at least one second communication protocol by means of the component, by parameterizing the second communication protocol based on the transmitted parameters,- after generating, setting a flag in the component, wherein the component prevents a repeated change of the second communication protocol when the flag is set,- after generating, inserting the component into the electromechanical locking system, in that a lock-ID (34) and/or a group-ID (35) and/or encryption parameter (36) are/is communicated to the component by means of the second communication protocol, and- exchanging data with other components of the locking system by means of the second communication protocol.
- Method according to claim 1,
characterized in that
the component is a lock, and that the lock is integrated into a locking system by transmitting information to the lock about authorized keys according to the second communication protocol. - Method according to claim 1 or 2,
characterized in that
at least the position of at least one value of at least one variable in a bit sequence is transmitted as parameter (33), wherein the bit sequence is exchanged according to the second communication protocol. - Method according to one of the preceding claims,
characterized in that
the component (10) communicates with at least one key (24) by means of the second communication protocol. - Method according to one of the preceding claims,
characterized in that
information about the authorization of keys (24) of a specific locking system is transmitted to a lock (10) according to the second communication protocol. - Method according to one of the preceding claims,
characterized in that
at least the size of the vector spaces of the doors and/or of the keys (24) and/or of the locking groups are transmitted as parameter (33). - Method according to one of the preceding claims,
characterized in that
when transmitting by means of the first communication protocol, a header (31) is transmitted before the parameter, which header designates the subsequent information as parameter (33) of the second communication protocol. - Method according to one of the preceding claims,
characterized in that
the parameter (33) are transmitted in blocks, wherein a specific block section identifies the parameter (33), and at least another block section identifies the value of the parameter (33). - Method according to one of the preceding claims,
characterized in that
at least one parameter (33) is transmitted that stands for the data format of the data stored or data to be stored on the key (24) and/or the lock (10). - Method according to one of the preceding claims,
characterized in that
at least one parameter (33) is transmitted that stands for at least one memory address in at least one key (24) from which memory adress data is read for checking authorization of the key (24). - Method according to one of the preceding claims,
characterized in that
at least one parameter (33) is transmitted, on the basis of which an encryption method is selected for protecting data transmitted according to the second communication protocol data. - Method according to one of the preceding claims,
characterized in that
the information about the assignmet of the lock (10) to a specific locking system is transmitted. - Method according to one of the preceding claims,
characterized in that
at least one parameter is transmitted, by which a data format for storage and/or transmission of a date designation and/or time designation and/or an authorization period is determined. - Method according to one of the preceding claims,
characterized in that
the transmission of the at least one parameter is conducted via a first physical interface, and that the transmission of data according to the second communication protocol is conducted via the same physical interface.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102011054637.5A DE102011054637B4 (en) | 2011-10-20 | 2011-10-20 | Procedure for configuring an electromechanical lock |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2584539A1 EP2584539A1 (en) | 2013-04-24 |
EP2584539B1 true EP2584539B1 (en) | 2016-09-28 |
Family
ID=47143541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12188900.0A Active EP2584539B1 (en) | 2011-10-20 | 2012-10-17 | Method for configuring an electromechanical lock |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2584539B1 (en) |
DE (1) | DE102011054637B4 (en) |
ES (1) | ES2608828T3 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE539039C2 (en) * | 2013-05-03 | 2017-03-28 | Assa Ab | Reader device for an electronic access key for a lock and method for configuring a reader device |
DE102016213503A1 (en) * | 2016-07-22 | 2018-01-25 | Frankl & Kirchner GmbH & Co KG Fabrik für Elektromotoren u. elektrische Apparate | A packaged assembly comprising a control unit and methods of configuring a packaged assembly |
DE102016118159A1 (en) * | 2016-09-26 | 2018-03-29 | ABUS Seccor GmbH | Zutrittskontrollsytem |
EP3955142B1 (en) | 2020-08-11 | 2023-06-28 | Marc Zacher | Method and system for authentication of a computing device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008144804A1 (en) * | 2007-05-28 | 2008-12-04 | Honeywell International Inc | Systems and methods for commissioning access control devices |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4924210A (en) * | 1987-03-17 | 1990-05-08 | Omron Tateisi Electronics Company | Method of controlling communication in an ID system |
DE4342641A1 (en) | 1993-12-14 | 1995-06-22 | Siemens Ag | Authentication method between a mobile data carrier and a stationary data station |
FR2717286B1 (en) | 1994-03-09 | 1996-04-05 | Bull Cp8 | Method and device for authenticating a data medium intended to allow a transaction or access to a service or a place, and corresponding medium. |
DE19701740A1 (en) * | 1997-01-20 | 1998-07-23 | Bosch Gmbh Robert | Actuating device for an authorization system |
FR2791206B1 (en) | 1999-03-15 | 2001-04-20 | Gemplus Card Int | METHOD FOR COMMUNICATING THE PARAMETERS OF A DIGITAL TRANSMISSION PROTOCOL |
DE19913931B4 (en) | 1999-03-26 | 2010-12-30 | Scheuermann, Carl H. | Verification procedure and electromechanical locking system |
DE10138217A1 (en) * | 2001-08-03 | 2003-03-20 | Atmel Germany Gmbh | Process for the transmission of data |
US7075412B1 (en) * | 2002-05-30 | 2006-07-11 | Thingmagic L.L.C. | Methods and apparatus for operating a radio device |
DE10237715B4 (en) * | 2002-08-17 | 2017-03-09 | Robert Bosch Gmbh | Device for accessing a vehicle control system via a wireless connection |
DE102006011980A1 (en) * | 2006-03-16 | 2007-09-27 | Teratron Gmbh | System for opening doors and gates with electronic opening device with a vehicle transponder |
US20080290995A1 (en) * | 2007-03-30 | 2008-11-27 | Skyetek, Inc. | System and method for optimizing communication between an rfid reader and an rfid tag |
US9704313B2 (en) | 2008-09-30 | 2017-07-11 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
-
2011
- 2011-10-20 DE DE102011054637.5A patent/DE102011054637B4/en active Active
-
2012
- 2012-10-17 EP EP12188900.0A patent/EP2584539B1/en active Active
- 2012-10-17 ES ES12188900.0T patent/ES2608828T3/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008144804A1 (en) * | 2007-05-28 | 2008-12-04 | Honeywell International Inc | Systems and methods for commissioning access control devices |
Also Published As
Publication number | Publication date |
---|---|
ES2608828T3 (en) | 2017-04-17 |
DE102011054637B4 (en) | 2025-01-23 |
EP2584539A1 (en) | 2013-04-24 |
DE102011054637A1 (en) | 2013-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2238576B1 (en) | Method and device for regulating access control | |
DE102007016467B3 (en) | Radio frequency identification system transponder, has storage area assigned to access-password that is reassigned to characteristic bit, where length and/or structure of access-password is adjustable by characteristic bit | |
EP3046447B1 (en) | Locking unit, housing having a locking unit, and method for unlocking one or more doors of the housing | |
DE3905651C2 (en) | ||
DE102006032129A1 (en) | Scalable access control method | |
EP0811739B1 (en) | Device and method for checking the user authorization of an access control system,in particular locking device for vehicles | |
AT513461B1 (en) | Access control procedure | |
EP3649625B1 (en) | Method for delegating access rights | |
EP2584539B1 (en) | Method for configuring an electromechanical lock | |
DE102014219502A1 (en) | System and method for limited access to a vehicle | |
EP2526441A1 (en) | Method for carrying out a transaction between a portable data carrier and a terminal | |
EP3567557A1 (en) | Locking system | |
AT516288B1 (en) | Method and device for managing access authorizations | |
EP3017432B1 (en) | Secured communication device for a vehicle and vehicle system | |
EP2799646A2 (en) | Method for producing a replacement part of a closing device | |
EP3027827B1 (en) | Electromagnetically lockable window handle | |
DE102005011436B4 (en) | Method and system for remote control of devices and components in a commercial vehicle | |
DE102010019467A1 (en) | Contactless entry system for use in hotel to open door, has digital keys, where count contained in keys is compared with count stored in near-field enabled lock, and lock is released based on positive comparison result | |
DE102016119951A1 (en) | Keyless authentication system for a motor vehicle, authentication method for providing operation of a motor vehicle and retrofit kit | |
DE102011117931A1 (en) | Method and system for identifying an RFID tag by a reader | |
EP3582192A1 (en) | Method for controlling an access regime to an object, closing unit and closing system | |
EP2820796B1 (en) | Method for monitoring a system comprising a number of readers and a multiplicity of portable communication units | |
EP3489916B1 (en) | Access control device, access control system and method | |
DE102015109789A1 (en) | Access control system for access control to an area and method for putting into operation an access control system for access control to an area | |
AT13608U1 (en) | Method and device for controlling access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17P | Request for examination filed |
Effective date: 20130327 |
|
17Q | First examination report despatched |
Effective date: 20130731 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20160414 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 833329 Country of ref document: AT Kind code of ref document: T Effective date: 20161015 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502012008351 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 5 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161228 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161031 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161229 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2608828 Country of ref document: ES Kind code of ref document: T3 Effective date: 20170417 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170128 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170130 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20161228 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502012008351 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161017 |
|
26N | No opposition filed |
Effective date: 20170629 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161017 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20161031 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20121017 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160928 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20241023 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20241009 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20241024 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20241024 Year of fee payment: 13 Ref country code: AT Payment date: 20241021 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20241118 Year of fee payment: 13 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20241101 Year of fee payment: 13 |